Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

acry spotted on test

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
IoT   show
🗑
RTOS   show
🗑
show multifunctional device -usually has weak cybersecurity -example printer  
🗑
show System on a chip. multiple components that run on a single chip are categorized as a SoC.  
🗑
ISO 27701   show
🗑
PKI   show
🗑
show Infrastructure as a Service -cloud service -offers storage/networking resources on demand while being cost effective -very flexible  
🗑
SOAR   show
🗑
ISO 31000   show
🗑
show non management standard but is much more detailed than 27001. both focus on ISMS (information security management system)  
🗑
ISO 27001   show
🗑
DDoS   show
🗑
MTBF   show
🗑
show Recovery Time Objective -The amount of time that an application can be down before significant damage  
🗑
show Mean Time To Resolve -the average time taken by security teams to remediate the detected incident or threat.  
🗑
MTTF   show
🗑
show Disk- based Operating System  
🗑
show an attacker that sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network  
🗑
Dissociation attack   show
🗑
Tailgating   show
🗑
show targeted cyberattack whereby a criminal compromises a website or group of websites frequented by a specific group of people.  
🗑
EAP-TLS   show
🗑
show Protected Extensible Authentication Protocol -uses TLS (transport layer security) to make messages secure and protected -authentications through 2 phases such as the classic 2 factor authentication apps you use today -doesn't provide encapsulation  
🗑
show Tunneled Transport Layer Security -Credential-based authentication protocol -allows authentication while inside encrypted TLS.  
🗑
show The authenticated wireless access design based on Protected Extensible Authentication Protocol Microsoft Challenge Handshake Authentication Protocol version 2  
🗑
show -Mutual authentication -Immunity to passive dictionary attacks -Immunity to man-in-the-middle (MitM) attacks -Flexibility to enable support for most password authentication interfaces -2 phased tunnel authentication  
🗑
show a group of "zombies" or compromised computers that are taken over to obtain further information.  
🗑
show the repetitive attempts to unlock a account using different passwords.  
🗑
show Cloud Access Security Broker -a security check point between cloud network users and cloud-based applications. They manage and enforce all data security policies and practices -like a sheriff that enforces the law set by a cloud service admin.  
🗑
DLL injection   show
🗑
Race condition   show
🗑
Resource exhaustion   show
🗑
MFA   show
🗑
FDE   show
🗑
MAC   show
🗑
show Self-Encrypting Drive -is a solid state drive or hard disk drive with an encryption circuit built into it -encryptions renders it unreadable without an encryption key.  
🗑
show prior unknown vulnerability or weakness in a system that is being utilized by threat actor. -this remains a zero day until the breach/infiltration is discovered which marks day 1  
🗑
TOTP   show
🗑
Smart Card   show
🗑
show Corporate Owned Personally Enabled -allows for both employees and enterprises to install applications on enterprise owned mobile devices.  
🗑
show Virtual Desktop Infrastructure -Much like your typical virtual machine; but, these leverage VMs to provision and manage virtual desktops and applications.  
🗑
Geofencing   show
🗑
show packaging of a software code from one operating system to make into one executable called a container.  
🗑
MDM   show
🗑
WPA2-PSK (AES)   show
🗑
802.1x   show
🗑
WPS   show
🗑
show Web Application Firewall layer 7 defense in the OSI layer protects web applications and APIs by filtering, monitoring, blocking malicious web traffic and application layer attacks  
🗑
DAC   show
🗑
ABAC   show
🗑
show Role Based Access Control method of access control that assigns and grants access to users based on their role within an organization .  
🗑
show a large, precomputed table designed to cache the output of cryptographic hash functions to decrypt hashed passwords into plaintext.  
🗑
Typosquatting   show
🗑
show phishing but with text messages. SMS messages.  
🗑
DNS poisoning   show
🗑
show an attack across wifi that breaks the connection between a victim and the device at the access point  
🗑
show Software as a Service -cloud -allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools  
🗑
show working to obtain higher privilege., such a root  
🗑
replay attack   show
🗑
show reducing the number of overall broadcast frames sent from the wired network to the wireless network.  
🗑
SIEM   show
🗑
IPS   show
🗑
show a way to create a fake, but a realistic version of your organizational data. The goal is to protect sensitive data, while providing a functional alternative when real data is not needed—for example, in user training, sales demos, or software testing.  
🗑
show also known as a sinkhole server, Internet sinkhole, or Blackhole DNS -used to prevent access to malicious URLs at an enterprise level. -blocks malicious DNS requests. -done via firewalls or other on-perm applications  
🗑
Honeynet   show
🗑
End-of-life   show
🗑
tabletop exercise   show
🗑
POST   show
🗑
show an important security feature designed to prevent malicious software from loading when your PC starts up (boots)  
🗑
show prevents corrupted components from loading during boot up -open source -firmware is compared/measured against known good values to verify their integrity.  
🗑
measured boot   show
🗑
show a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that the record cannot be altered retroactively without the alteration of all subsequent blocks and the consensus of the network.  
🗑
show different on each side; the sender and the recipient use two different keys.  
🗑
BYOD   show
🗑
SHA256   show
🗑
show a special form of spear phishing that targets specific high-ranking victims within a company.  
🗑
show a type of phishing that utilizes voice calls to obtain sensitive information.  
🗑
show fraudulent messages or emails sent to obtain personal information.  
🗑
Mitigation   show
🗑
Transference   show
🗑
show When the identified risk exceeds the risk appetite, they will eliminate the risk. -removal of hazards, activities, and exposures that can negatively affect the business.  
🗑
acceptance   show
🗑
memory leak   show
🗑
split knowledge   show
🗑
show The Master Policy enables organizations to ensure that passwords can only be retrieved after permission or ‘confirmation’ has been granted from an authorized Safe Owner (s)  
🗑
show A demilitarized zone network, or DMZ, is a subnet that creates an extra layer of protection from external attack.  
🗑
show Time To Live -if a package or a ping is not acknowledged within a certain time, the request/package/ping is dropped,  
🗑
show also known as cookie hijacking. gains access to webserver via a duplicate session.  
🗑
TACACS+   show
🗑
show allows for the encryption of LDAP data (which includes user credentials) in transit during any communication with the LDAP server (like a directory bind), thereby protecting against credential theft. -over SSL or secure LDAP  
🗑
Kerberos   show
🗑
Buffer overflow   show
🗑
show a logical overlay network that groups together a subset of devices that share a physical LAN, isolating the traffic for each group. -also known as virtual LAN  
🗑
LAN   show
🗑
IPSec   show
🗑
SSL   show
🗑
CA   show
🗑
show Redundant Array of Independent Disks - data storage virtualization technology that combines multiple physical disk drive components into one or more logical units to better catch errors  
🗑
show energy efficient layout for server racks and other computing equipment especially for data warehouses.  
🗑
Biometric locks   show
🗑
show given access to specific door(s) and supply a key to access the other door(s). -can mitigate tailgating  
🗑
show In cryptography, X.509 is an International Telecommunication Union (ITU) standard defining the format of public key certificates  
🗑
symmetric encryption   show
🗑
show A data custodian ensures: 1. Access to the data is authorized and controlled 2. Data stewards are identified for each data set 3. Technical processes sustain data integrity  
🗑
show practice of converting a password to a longer and more random key for cryptographic purposes such as encryption  
🗑
Salting   show
🗑
show the act of making something obscure, unclear, or unintelligible -concealment of written code purposefully by the programmer .  
🗑
HSM   show
🗑
show Trusted Platform Module -a chip on a computer's mother board or processor that serves many purposes such as authentication.  
🗑
full disk encryption   show
🗑
UEFI BIOS   show
🗑
SQL injection   show
🗑
show uses SSLStrip tool or related techniques to strip away protocol and HTTPS. a kind of MitM (man in the middle) that takes advantage of the TLS protocol and the way it begins connections  
🗑
show Cross Site Request Forgery OWASP Foundation an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated  
🗑
show malicious program(s) that spreads through a network and replicates on its own.  
🗑
show Remote Access Trojan - type of spyware that takes control over an infected device. it opens a backdoor and allows administrative control over a victim's computer.  
🗑
show a piece of code intentionally inserted into software system that will set off a malicious function when specified conditions are met.  
🗑
show attacker that sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network  
🗑
ALE   show
🗑
SLE   show
🗑
show Annual Rate of Occurrence -predicted likelihood of an event that will cause an SLE occurring within a given year.  
🗑
show General Data Protection Regulation a regulation in EU law on data protection and privacy in the EU and EEA (European Economic Area).  
🗑
show Payment Card Industry / Data Security Standard - a cybersecurity standard backed by all the major credit card and payment processing companies that aims to keep credit and debit card numbers safe.  
🗑
show Cloud Security Alliance Cloud Controls Matrix cybersecurity control framework for cloud computing. offer understanding of security concepts and principles  
🗑
show ARP poisoning (also known as ARP spoofing) is a cyber attack carried out through malicious ARP messages -After a successful ARP spoofing, a hacker changes the company's ARP table, so it contains falsified MAC maps  
🗑
show threats are often used to gain unauthorized access to systems or data, or to install malware on systems  
🗑
Polymorphic virus   show
🗑
show emails are stored on the server by default, which could present issues if the server is compromised.  
🗑
S/MIME   show
🗑
show enable websites to use HTTPS, which is more secure than HTTP.  
🗑
show Data Loss Prevention security solution that identifies and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.  
🗑
show Simple Mail Transfer Protocol -email uses this -insecure but can be changed by the user -most susceptible to phishing attacks  
🗑
Proxies   show
🗑
honeypot   show
🗑
show A device that can manage large amounts of VPN connections. Not to be confused with a VPN server.  
🗑
show Platform as a service -provides tools to host, build, deploy consumer facing applications -cloud -less technical  
🗑
show Recovery Point Objective -the max data lass a company can experience before significant harm  
🗑
TLS   show
🗑
show number 4 -tcp -tls -ssl  
🗑
show number 1 -usb -ethernet -hdmi cord  
🗑
OSI layer Application   show
🗑
show number 6 -css -html -MPEG -JPEG  
🗑
show number 5 -ssh -net bios  
🗑
show number 3 -IP -ICMP  
🗑
show number 2 -switch -wifi -point to point protocol -MAC  
🗑
show Intrusion Detection Systems -able to flag all suspicious incoming traffic and will notify NETSec officials -this is a PASSIVE security measure so it cannot defend against anything but can only detect and notify. -out of band  
🗑
show traffic goes through a monitored port  
🗑
out of band   show
🗑
spear fishing   show
🗑
LDAP   show
🗑
federation   show
🗑
Deterrent security control   show
🗑
show physically limits access to a device or area.  
🗑
show may not prevent access, but it can identify and record any intrusion event  
🗑
Corrective security control   show
🗑
show doesn't prevent an attack, but it does restore from an attack using other means  
🗑
show real-world security such as a fence or door lock  
🗑
show the practice of identifying, analyzing, and prioritizing relationships with internal and external stakeholders who are directly affected by the outcome of a venture or project  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: mandirich
Popular Computers sets